dwww Home | Show directory contents | Find package

imagemagick (8:7.1.1.43+dfsg1-1+deb13u8) trixie-security; urgency=high

  * Fix CVE-2026-32636:
    The NewXMLTree method contains a bug that could result
    in a crash due to an out of write bounds of a single zero byte
  * Fix CVE-2026-33535:
    An out-of-bounds write of a zero byte exists in the X11 `display`
    interaction path that could lead to a crash.
  * Fix CVE-2026-33536:
    Due to an incorrect return value on certain platforms a pointer is
    incremented past the end of a buffer that is on the stack and
    that could result in an out of bounds write.
  * Fix CVE-2026-33899:
    When `Magick` parses an XML file it is possible that a single
    zero byte is written out of the bounds
  * Fix CVE-2026-33900:
    The viff encoder contains an integer truncation/wraparound issue
    on 32-bit builds that could trigger an out of bounds heap write,
    potentially causing a crash
  * Fix CVE-2026-33901:
    a heap buffer overflow occurs in the MVG decoder that
    could result in an out of bounds write when processing a
    crafted image.
  * Fix CVE-2026-33902:
    a stack overflow vulnerability in ImageMagick's FX expression
    parser allows an attacker to crash the process by providing a
    deeply nested expression.
  * Fix CVE-2026-33905:
    The -sample operation has an out of bounds read when
    an specific offset is set through the `sample:offset`
    define that could lead to an out of bounds read.
  * Fix CVE-2026-33908:
    Magick frees the memory of the XML tree via the `DestroyXMLTree()`
    function; however, this process is executed recursively with no
    depth limit imposed. When Magick processes an XML file with
    deeply nested structures, it will exhaust the stack memory,
    resulting in a Denial of Service (DoS) attack
  * Fix CVE-2026-34238:
    An integer overflow in the despeckle operation causes
    a heap buffer overflow on 32-bit builds that will result
    in an out of bounds write.
  * Fix CVE-2026-40169:
    A crafted image could result in an out of bounds heap write
    when writing a yaml or json output, resulting in a crash.
  * Fix CVE-2026-40183:
    The JXL encoder has an heap write overflow when a user specifies
    that the image should be encoded as 16 bit floats.
  * Fix CVE-2026-40310:
    A heap out-of-bounds write was found in the JP2 encoder when a user
    specifies an invalid sampling index.
  * Fix CVE-2026-40311:
    A heap use-after-free vulnerability was found that can cause a
    crash when reading and printing values from an invalid XMP profile.
  * Fix CVE-2026-40312:
    An off by one error in the MSL decoder could result in a crash
    when a malicous MSL file is read. 

 -- Bastien Roucariès <rouca@debian.org>  Wed, 22 Apr 2026 16:06:47 +0200

imagemagick (8:7.1.1.43+dfsg1-1+deb13u7) trixie-security; urgency=high

  * Fix CVE-2026-28493:
    An integer overflow vulnerability exists in the SIXEL decoder.
  * Fix CVE-2026-28494:
    A stack buffer overflow exists in ImageMagick's morphology
    kernel parsing functions. User-controlled kernel strings
    exceeding a buffer are copied into fixed-size stack buffers
    via memcpy without bounds checking, resulting in stack
    corruption.
  * Fix CVE-2026-28686:
    A heap-buffer-overflow vulnerability exists in the PCL
    encoder due to an undersized output buffer allocation
  * Fix CVE-2026-28687:
    A heap use-after-free vulnerability in ImageMagick's
    MSL decoder allows an attacker to trigger access to
    freed memory by crafting an MSL file.
  * Fix CVE-2026-28688:
    A heap-use-after-free vulnerability exists in the MSL encoder,
    where a cloned image is destroyed twice. The MSL coder does not support
    writing MSL so the write capability has been removed.
  * Fix CVE-2026-28689:
    domain="path" authorization is checked before final
    file open/use. A symlink swap between check-time and use
    time bypasses policy-denied read/write
  * Fix CVE-2026-28690:
    a stack buffer overflow vulnerability exists in the
    MNG encoder. There is a bounds checks missing that could
    corrupting the stack with attacker-controlled data.
  * Fix CVE-2026-28691:
    An uninitialized pointer dereference vulnerability exists
    in the JBIG decoder due to a missing check
  * Fix CVE-2026-28692:
    The MAT decoder uses 32-bit arithmetic due to incorrect
    parenthesization resulting in a heap over-read.
  * Fix CVE-2026-28693:
    An integer overflow in DIB coder can result in out of
    bounds read or write
  * Fix CVE-2026-30883:
    An extremely large image profile could result in a heap
    overflow when encoding a PNG image.
  * Fix CVE-2026-30929:
    MagnifyImage uses a fixed-size stack buffer.
    When using a specific image it is possible to overflow
    this buffer and corrupt the stack.
  * Fix CVE-2026-30931
    A heap-based buffer overflow in the UHDR encoder
    can happen due to truncation of a value and it would
    allow an out of bounds write.
  * Fix CVE-2026-30935:
    BilateralBlurImage contains a heap buffer over-read caused
    by an incorrect conversion. When processing a crafted image
    with the -bilateral-blur operation an out of bounds read
    can occur.
  * Fix CVE-2026-30936:
    A crafted image could cause an out of bounds heap write inside the
    WaveletDenoiseImage method. When processing a crafted image with
    the -wavelet-denoise operation an out of bounds write can occur.
  * Fix CVE-2026-30937:
    A 32-bit unsigned integer overflow in the XWD (X Windows)
    encoder can cause an undersized heap buffer allocation.
    When writing a extremely large image an out of bounds heap
    write can occur
  * Fix CVE-2026-31853:
    An overflow on 32-bit systems can cause a crash in the
    SFW decoder when processing extremely large images.
  * Fix CVE-2026-32259:
    When a memory allocation fails in the sixel encoder it would
    be possible to write past the end of a buffer on the stack
  * Port SVG and MSL coder to 7.1.2-16

 -- Bastien Roucariès <rouca@debian.org>  Mon, 16 Mar 2026 00:43:38 +0100

imagemagick (8:7.1.1.43+dfsg1-1+deb13u6) trixie-security; urgency=high

  * Fix CVE-2026-24481:
    A heap information disclosure vulnerability exists
    in ImageMagick's PSD (Adobe Photoshop) format handler.
    When processing a maliciously crafted PSD file containing
    ZIP-compressed layer data that decompresses to less than
    the expected size, uninitialized heap memory is leaked
    into the output image.
  * Fix CVE-2026-24484:
    Magick fails to check for multi-layer nested mvg
    conversions to svg, leading to DoS.
  * Fix CVE-2026-24485:
    When a PCD file does not contain a valid Sync marker, the
    DecodeImage() function becomes trapped in an infinite loop while
    searching for the Sync marker, causing the program to become
    unresponsive and continuously consume CPU resources, ultimately
    leading to system resource exhaustion and Denial of Service
    (DoS)
  * Fix CVE-2026-25576:
    A heap buffer over-read vulnerability exists in multiple
    raw image format handles. The vulnerability occurs when
    processing images with -extract dimensions larger than
    -size dimensions, causing out-of-bounds memory reads
    from a heap-allocated buffer.
  * Fix CVE-2026-25637:
    A memory leak in the ASHLAR image writer allows an attacker to exhaust
    process memory by providing a crafted image that results in small
    objects that are allocated but never freed.
  * Fix CVE-2026-25638:
    A memory leak exists in `coders/msl.c`. In the `WriteMSLImage`
    function of the `msl.c` file, resources are allocated. But the
    function returns early without releasing these allocated resources.
  * Fix CVE-2026-25794:
    `WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute
    the pixel buffer size. Prior to version 7.1.2-15, when image
    dimensions are large, the multiplication overflows 32-bit `int`,
    causing an undersized heap allocation followed by an out-of-bounds
    write.
  * Fix CVE-2026-25795:
    `ReadSFWImage()` (`coders/sfw.c`), when temporary file
    creation fails, `read_info` is destroyed before its `filename`
    member is accessed, causing a NULL pointer dereference and crash.
  * Fix CVE-2026-25796:
    In `ReadSTEGANOImage()` (`coders/stegano.c`), the `watermark` Image
    object is not freed on three early-return paths, resulting in a
    definite memory leak (~13.5KB+ per invocation) that can be exploited
    for denial of service.
  * Fix CVE-2026-25797:
    The ps coders, responsible for writing PostScript files, fails to
    sanitize the input before writing it into the PostScript header. An
    attacker can provide a malicious file and inject arbitrary PostScript
    code. When the resulting file is processed by a printer or a viewer
    (like Ghostscript), the injected code is interpreted and executed. The
    html encoder does not properly escape strings that are written to in
    the html document. An attacker can provide a malicious file and
    injection arbitrary html code.
  * Fix CVE-2026-25798:
    A NULL pointer dereference in ClonePixelCacheRepository allows a
    remote attacker to crash any application linked against ImageMagick by
    supplying a crafted image file, resulting in denial of service.
  * Fix CVE-2026-25799:
    A logic error in YUV sampling factor validation allows an invalid
    sampling factor to bypass checks and trigger a division-by-zero during
    image loading, resulting in a reliable denial-of-service.
  * Fix CVE-2026-25897:
    An Integer Overflow vulnerability exists in the sun decoder. On 32-bit
    systems/builds, a carefully crafted image can lead to an out of bounds
    heap write.
  * Fix CVE-2026-25898:
    The UIL and XPM image encoder do not validate the
    pixel index value returned by `GetPixelIndex()` before using it as an
    array subscript. In HDRI builds, `Quantum` is a floating-point type,
    so pixel index values can be negative. An attacker can craft an image
    with negative pixel index values to trigger a global buffer overflow
    read during conversion, leading to information disclosure or a process
    crash.
  * Fix CVE-2026-25965:
    ImageMagick’s path security policy is enforced on the raw filename
    string before the filesystem resolves it. As a result, a policy rule
    such as /etc/* can be bypassed by a path traversal. The OS resolves
    the traversal and opens the sensitive file, but the policy matcher
    only sees the unnormalized path and therefore allows the read. This
    enables local file disclosure (LFI) even when policy-secure.xml is
    applied.
  * Fix CVE-2026-25966:
    The shipped "secure" security policy includes a rule intended to
    prevent reading/writing from standard streams. However, ImageMagick
    also supports fd:<n> pseudo-filenames (e.g., fd:0, fd:1).
    This path form is not blocked by the
    secure policy templates, and therefore bypasses the protection goal of
    "no stdin/stdout."
  * Fix CVE-2026-25967:
    A stack-based buffer overflow exists in the ImageMagick FTXT image
    reader. A crafted FTXT file can cause out-of-bounds writes on the
    stack, leading to a crash.
  * Fix CVE-2026-25968:
    A stack buffer overflow occurs when processing the an attribute in
    msl.c. A long value overflows a fixed-size stack buffer, leading to
    memory corruption.
  * Fix CVE-2026-25969:
    A memory leak exists in `coders/ashlar.c`. The `WriteASHLARImage`
    allocates a structure. However, when an exception is thrown, the
    allocated memory is not properly released, resulting in a potential
    memory leak.
  * Fix CVE-2026-25970:
    A signed integer overflow vulnerability in ImageMagick's SIXEL decoder
    allows an attacker to trigger memory corruption and denial of service
    when processing a maliciously crafted SIXEL image file. The
    vulnerability occurs during buffer reallocation operations where
    pointer arithmetic using signed 32-bit integers overflows.
  * Fix CVE-2026-25971:
    Magick fails to check for circular references between two MSLs,
    leading to a stack overflow.
  * Fix CVE-2026-25982:
    A heap out-of-bounds read vulnerability exists in the `coders/dcm.c`
    module. When processing DICOM files with a specific configuration, the
    decoder loop incorrectly reads bytes per iteration. This causes the
    function to read past the end of the allocated buffer, potentially
    leading to a Denial of Service or Information Disclosure.
  * Fix CVE-2026-25983:
    A crafted MSL script triggers a heap-use-after-free. The operation
    element handler replaces and frees the image while the parser
    continues reading from it, leading to a UAF in ReadBlobString during
    further parsing.
  * Fix CVE-2026-25985:
    A crafted SVG file containing an malicious element causes ImageMagick
    to attempt to allocate ~674 GB of memory, leading to an out-of-memory
    abort.
  * Fix CVE-2026-25986:
    A heap buffer overflow write vulnerability exists in ReadYUVImage()
    (coders/yuv.c) when processing malicious YUV 4:2:2 (NoInterlace)
    images. The pixel-pair loop writes one pixel beyond the allocated row
    buffer.
  * Fix CVE-2026-25987:
    A heap buffer over-read vulnerability exists in the MAP image decoder
    when processing crafted MAP files, potentially leading to crashes or
    unintended memory disclosure during image decoding.
  * Fix CVE-2026-25988:
    Sometimes msl.c fails to update the stack index, so an image is stored
    in the wrong slot and never freed on error, causing leaks.
  * Fix CVE-2026-25989:
    A crafted SVG file can cause a denial of service. An off-by-one
    boundary check (`>` instead of `>=`) that allows bypass the guard and
    reach an undefined `(size_t)` cast.
  * Fix CVE-2026-26066:
    A crafted profile contain invalid IPTC data may cause an infinite loop
    when writing it with `IPTCTEXT`.
  * Fix CVE-2026-26283:
    A `continue` statement in the JPEG extent binary search loop in the
    jpeg encoder causes an infinite loop when writing persistently fails.
  * Fix CVE-2026-26284:
    ImageMagick lacks proper boundary checking when processing
    Huffman-coded data from PCD (Photo CD) files. The decoder contains an
    function that has an incorrect initialization that could cause an out
    of bounds read.
  * Fix CVE-2026-26983:
    The MSL interpreter crashes when processing a invalid `<map>` element
    that causes it to use an image after it has been freed.
  * Fix CVE-2026-27798:
    A heap buffer over-read vulnerability occurs when processing an image
    with small dimension using the `-wavelet-denoise` operator.
  * Fix CVE-2026-27799:
    A heap buffer over-read vulnerability exists in the DJVU image format
    handler. The vulnerability occurs due to integer truncation when
    calculating the stride (row size) for pixel buffer allocation. The
    stride calculation overflows a 32-bit signed integer, resulting in an
    out-of-bounds memory reads.

 -- Bastien Roucariès <rouca@debian.org>  Wed, 04 Mar 2026 23:01:36 +0100

imagemagick (8:7.1.1.43+dfsg1-1+deb13u5) trixie-security; urgency=high

  * Fix CVE-2026-22770 (Closes: #1126074)
    The BilateralBlurImage method will allocate a set of
    double buffers inside AcquireBilateralTLS.
    The last element in the set is not properly initialized.
    This will result in a release of an invalid pointer
    inside DestroyBilateralTLS when the memory allocation fails
  * Fix CVE-2026-23874 (Closes: #1126075)
    a stack overflow was found via infinite recursion in
    MSL (Magick Scripting Language) `<write>` command when
    writing to MSL format.
  * Fix CVE-2026-23876 (Closes: #1126076)
    A heap buffer overflow vulnerability was found in the XBM
    image decoder (ReadXBMImage) allows an attacker to write
    controlled data past the allocated heap buffer when
    processing a maliciously crafted image file.
    Any operation that reads or identifies an image can
    trigger the overflow, making it exploitable via common
    image upload and processing pipelines.
  * Fix CVE-2026-23952 (Closes: 1126077)
    NULL pointer dereference was found in MSL parser via <comment>
    tag before image load

 -- Bastien Roucariès <rouca@debian.org>  Wed, 21 Jan 2026 22:54:51 +0100

imagemagick (8:7.1.1.43+dfsg1-1+deb13u4) trixie; urgency=high

  * Fix CVE-2025-62594 (Closes: #1119296)
    Imagemagick is vulnerable to denial-of-service due to unsigned integer
    underflow and division-by-zero in the CLAHEImage function. When tile
    width or height is zero, unsigned underflow occurs in pointer
    arithmetic, leading to out-of-bounds memory access, and
    division-by-zero causes immediate crashes.
  * Fix CVE-2025-65955 (Closes: #1122827)
    There is a vulnerability in ImageMagick’s Magick++ layer that
    manifests when Options::fontFamily is invoked with an empty
    string. Clearing a font family calls RelinquishMagickMemory on
    _drawInfo->font, freeing the font string but leaving _drawInfo->font
    pointing to freed memory while _drawInfo->family is set to that
    (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font
    re-frees or dereferences dangling memory. DestroyDrawInfo and other
    setters (Options::font, Image::font) assume _drawInfo->font remains
    valid, so destruction or subsequent updates trigger crashes or heap
    corruption.
  * Fix CVE-2025-66628 (Closes: #1122584)
    The TIM (PSX TIM) image parser contains a critical integer overflow
    vulnerability in its ReadTIMImage function (coders/tim.c). The code
    reads width and height (16-bit values) from the file header and
    calculates image_size = 2 * width * height without checking for
    overflow. On 32-bit systems (or where size_t is 32-bit), this
    calculation can overflow if width and height are large (e.g., 65535),
    wrapping around to a small value.
  * Fix CVE-2025-68618:
    Magick's failure to limit the depth of SVG file reads caused
    a DoS attack.
  * Do not allow vid for vector graphics
  * Fix CVE-2025-68950:
    Magick's failure to limit MVG mutual references forming a loop
  * Fix CVE-2025-69204:
    Converting a malicious MVG file to SVG caused an integer overflow.

 -- Bastien Roucariès <rouca@debian.org>  Mon, 29 Dec 2025 00:33:04 +0100

imagemagick (8:7.1.1.43+dfsg1-1+deb13u3) trixie; urgency=high

  * Fix CVE-2025-62171 (Closes: #1118340)
    Integer Overflow in BMP Decoder (ReadBMP):
    CVE-2025-57803 claims to be patched, but the fix is incomplete
    and ineffective.
    .
    The patch added BMPOverflowCheck() but placed it
    after the overflow occurs, making it useless.
    A malicious 58-byte BMP file can trigger AddressSanitizer
    crashes and DoS.

 -- Bastien Roucariès <rouca@debian.org>  Sun, 19 Oct 2025 10:37:32 +0200

imagemagick (8:7.1.1.43+dfsg1-1+deb13u2) trixie-security; urgency=high

  * Fix CVE-2025-55004:
    ImageMagick is vulnerable to heap-buffer overflow
    read around the handling of images with separate alpha channels
    when performing image magnification in ReadOneMNGIMage.
    This can likely be used to leak subsequent memory contents
    into the output image
    (Closes: #1111101)
  * Fix CVE-2025-55005:
    when preparing to transform from Log to sRGB colorspaces,
    the logmap construction fails to handle cases where the
    reference-black or reference-white value is larger than 1024.
    This leads to corrupting memory beyond the end of the
    allocated logmap buffer.
    (Closes: #1111102)
  * Fix CVE-2025-55154:
    the magnified size calculations in ReadOneMNGIMage
    (in coders/png.c) are unsafe and can overflow, leading to
    memory corruption.
    (Closes: #1111103)
  * Fix CVE-2025-55212:
    Passing a geometry string containing only a colon (":")
    to montage -geometry leads GetGeometry() to set width/height to 0.
    Later, ThumbnailImage() divides by these zero dimensions,
    triggering a crash (SIGFPE/abort), resulting in a denial of service.
    (Closes: #1111587)
  * Fix CVE-2025-55298:
    A format string bug vulnerability exists in InterpretImageFilenam
    function where user input is directly passed to FormatLocaleString
    without proper sanitization. An attacker can overwrite arbitrary
    memory regions, enabling a wide range of attacks from heap
    overflow to remote code execution.
    (Closes: #1111586)
  * Fix CVE-2025-57803:
    A 32-bit integer overflow in the BMP encoder’s scanline-stride
    computation collapses bytes_per_line (stride) to a tiny
    value while the per-row writer still emits 3 × width bytes
    for 24-bpp images. The row base pointer advances using the
    (overflowed) stride, so the first row immediately writes
    past its slot and into adjacent heap memory with
    attacker-controlled bytes.
    (Closes: #1112469)
  * Fix CVE-2025-57807:
    A security problem was found in SeekBlob(), which permits
    advancing the stream offset beyond the current end without
    increasing capacity, and WriteBlob(), which then expands by
    quantum + length (amortized) instead of offset + length,
    and copies to data + offset. When offset ≫ extent, the
    copy targets memory beyond the allocation, producing a
    deterministic heap write on 64-bit builds. No 2⁶⁴
    arithmetic wrap, external delegates, or policy settings
    are required.
    (Closes: #1114520)

 -- Bastien Roucariès <rouca@debian.org>  Sun, 07 Sep 2025 00:31:52 +0200

imagemagick (8:7.1.1.43+dfsg1-1+deb13u1) trixie; urgency=medium

  * Fix CVE-2025-53014:
    A heap buffer overflow was found in the `InterpretImageFilename`
    function. The issue stems from an off-by-one error that
    causes out-of-bounds memory access when processing format
    strings containing consecutive percent signs (`%%`).
    (Closes: #1109339)
  * Fix CVE-2025-53015:
    Infinite loop occur when writing during a specific XMP
    file conversion command
    (Closes: #1109339)
  * Fix CVE-2025-53019:
    `magick stream` command, specifying
    multiple consecutive `%d` format specifiers in a
    filename template causes a memory leak
    (Closes: #1109339)
  * Fix CVE-2025-53101:
    `magick mogrify` command, specifying multiple consecutive
    `%d` format specifiers in a filename template causes
    internal pointer arithmetic to generate an address
    below the beginning of the stack buffer, resulting
    in a stack overflow through `vsnprintf()`
    (Closes: #1109339)
  * Fix CVE-2025-43965:
    In MIFF image processing, image depth is mishandled
    after SetQuantumFormat is used.
  * Fix CVE-2025-46393:
    In multispectral MIFF image processing, packet_size is mishandled.

 -- Bastien Roucariès <rouca@debian.org>  Tue, 15 Jul 2025 22:29:23 +0200

imagemagick (8:7.1.1.43+dfsg1-1) unstable; urgency=medium

  * New upstream version
  * Allow smooth upgrade (Closes: #1087309)
  * Fix documentation (Closes: #1034333)

 -- Bastien Roucariès <rouca@debian.org>  Sun, 29 Dec 2024 11:21:15 +0000

imagemagick (8:7.1.1.39+dfsg1-3) unstable; urgency=medium

  [ Bastien Roucariès]
  * Fix imagemagick: .pc files contains -lfftw3
    but no libfftw3-dev dependency (Closes: #1064658)

  [ Helmut Grohne ]
  * Fix FTCBFS: (Closes: #1086784). Thanks to Helmut
    Grohne.
    + Drop versioned g++ dependency satisfied in buster.
    + Export PERL5LIB for cross building.
    + Use the installed convert for generating the icons cache.

 -- Bastien Roucariès <rouca@debian.org>  Tue, 12 Nov 2024 17:39:35 +0000

imagemagick (8:7.1.1.39+dfsg1-2) unstable; urgency=medium

  * Add dejavu font to test for gd
  * Fix autopkgtest by finding a suitable font is default font is
    not found.

 -- Bastien Roucariès <rouca@debian.org>  Tue, 29 Oct 2024 16:54:08 +0000

imagemagick (8:7.1.1.39+dfsg1-1) unstable; urgency=medium

  * New upstream version
  * Upload to unstable

 -- Bastien Roucariès <rouca@debian.org>  Sun, 27 Oct 2024 18:45:43 +0000

imagemagick (8:7.1.1.33+dfsg1-3) UNRELEASED; urgency=medium

  * Merge generate rdeps at test time. Thanks to josh
  * Add depends imagemagick-${IMVERSION}-common
    to libmagickcore-dev quantum package

 -- Bastien Roucariès <rouca@debian.org>  Sat, 19 Oct 2024 15:14:51 +0000

imagemagick (8:7.1.1.33+dfsg1-2) experimental; urgency=medium

  * Sourcefull rebuild
  * Bump policy no changes
  * Add :any anotation

 -- Bastien Roucariès <rouca@debian.org>  Thu, 22 Aug 2024 10:11:37 +0000

imagemagick (8:7.1.1.33+dfsg1-1) experimental; urgency=medium

  * New major version (Closes: #929825)

 -- Bastien Roucariès <rouca@debian.org>  Tue, 20 Aug 2024 20:49:37 +0000

imagemagick (8:6.9.13.12+dfsg1-1) unstable; urgency=medium

  * New upstream version
  * Acknowledge NMU
  * Drop time-to-live-returned-incorrect-results-when-SOURCE_.patch
    applied upstream.
  * use pkgconf instead of pkg-config
  * Close variation of CVE-2023-34151 (Closes: #1070340)
  * Libmagick++-6.q16-dev included assert.h inside namespace.
    (Closes: #969128)

 -- Bastien Roucariès <rouca@debian.org>  Fri, 28 Jun 2024 16:37:24 +0000

imagemagick (8:6.9.12.98+dfsg1-5.2) unstable; urgency=medium

  * Non-maintainer upload.
  * Fixup runtime dependencies due to 64-bit time_t transition
    (Closes: #1066935)

 -- Gianfranco Costamagna <locutusofborg@debian.org>  Fri, 15 Mar 2024 16:04:36 +0100

imagemagick (8:6.9.12.98+dfsg1-5.1) unstable; urgency=medium

  * Non-maintainer upload.
  * Rename libraries for 64-bit time_t transition.  Closes: #1064140

 -- Steve Langasek <vorlon@debian.org>  Fri, 01 Mar 2024 01:31:19 +0000

imagemagick (8:6.9.12.98+dfsg1-5) unstable; urgency=medium

  * Bug fix: "please update Suggests: imagemagick-doc; to
    imagemagick-6-doc", thanks to Vincent Lefevre
    (Closes: #1059314).
  * Bug fix: "missing Breaks+Replaces against the dropped imagemagick-doc
    package, in order to force its removal", thanks to Vincent Lefevre
    (Closes: #1059193).

 -- Bastien Roucariès <rouca@debian.org>  Wed, 27 Dec 2023 10:29:58 +0000

imagemagick (8:6.9.12.98+dfsg1-4) unstable; urgency=medium

  * Replace ufraw-batch suggest by libraw-bin
    (Closes: #1038637)
  * Update changelog entry for CVE fixed.
  * Move from gsfonts to fonts-urw-base35. Thanks to Vincent Lefevre
    (Closes: #1020358, #1020355, #1020363, #1020370)
  * Recommends fonts-tuffy (Closes: #1054580)
  * Fix a typo in debian patch (Closes: #1054506)

 -- Bastien Roucariès <rouca@debian.org>  Mon, 30 Oct 2023 09:26:06 +0000

imagemagick (8:6.9.12.98+dfsg1-3) unstable; urgency=medium

  * Bug fix: "imagemagick no longer sets
    "PACKAGE_RELEASE_DATE", thanks to Håvard F. Aasen (Closes:
    #1054462).
  * Bug fix: "reproducible builds: Embeds different paths on usrmerge
    system", thanks to Vagrant Cascadian (Closes: #983303).

 -- Bastien Roucariès <rouca@debian.org>  Wed, 25 Oct 2023 23:30:18 +0000

imagemagick (8:6.9.12.98+dfsg1-2) unstable; urgency=medium

  * Upload to unstable

 -- Bastien Roucariès <rouca@debian.org>  Sun, 22 Oct 2023 15:35:30 +0000

imagemagick (8:6.9.12.98+dfsg1-1) experimental; urgency=medium

  * New upstream version
  * Drop package imagemagick-doc and imagemagick-common
  * Fix CVE-2023-3428: A heap-based buffer overflow vulnerability
    was found in coders/tiff.c. This issue may allow a local attacker
    to trick the user into opening a specially crafted file,
    resulting in an application crash and denial of service.
  * CVE-2023-3745: A heap-based buffer overflow issue
    was found in ImageMagick's PushCharPixel() function
    in quantum-private.h. This issue may allow a local
    attacker to trick the user into opening a specially crafted file,
    triggering an out-of-bounds read error and allowing an application
    to crash, resulting in a denial of service.
  * Import patch for upstream that avoid a FTBFS due to
    SOURCE_DATE_EPOCH set
  * Use a debian policy. Install other policies as user
    convenience.
  * Recompile means no depends on old libwmf
    (Closes: #1005229)

 -- Bastien Roucariès <rouca@debian.org>  Sat, 21 Oct 2023 14:40:53 +0000

imagemagick (8:6.9.12.90+dfsg1-1) UNRELEASED; urgency=medium

  [ Luciano Bello ]
  * removing Luciano as uploader, as he is retiring

  [ Pino Toscano ]
  * Drop the XPM icon for display-im, as the Debian menu file that needed it
    was removed in 8:6.9.2.10+dfsg-1.
  * Tweak the sizes for which we generate PNG versions of the display-im
    application icon:
    - drop 8x8, and 42x42: they are not specified in hicolor, and thus cannot
      be reliably used; also they are very niche sizes, and they can be
      downscaled if needed
    - add 512x512

  [ Bastien Roucariès ]
  * New upstream version
  * Aknowledge NMU
  * Fix CVE-2021-3610: A heap-based buffer overflow vulnerability
    was found in ImageMagick in ReadTIFFImage() in coders/tiff.c.
    This issue is due to an incorrect setting of the pixel array size,
    which can lead to a crash and segmentation fault.
    (Closes: #1037090).
  * Fix CVE-2022-1115: A heap-buffer-overflow flaw was found in
    ImageMagick’s PushShortPixel() function of quantum-private.h file.
    This vulnerability is triggered when an attacker passes a specially
    crafted TIFF image file to ImageMagick for conversion, potentially
    leading to a denial of service.
    (Closes: #1013282)
  * Fix CVE-2022-3213: A heap buffer overflow issue was found in ImageMagick.
    When an application processes a malformed TIFF file, it could lead to
    undefined behavior or a crash causing a denial of service.
    (Closes: #1021141).
  * Fix CVE-2023-1289: A vulnerability was discovered in ImageMagick where
    a specially created SVG file loads itself and causes a
    segmentation fault.
    This flaw allows a remote attacker to pass a specially crafted
    SVG file that leads to a segmentation fault, generating many
    trash files in "/tmp", resulting in a denial of service.
    When ImageMagick crashes, it generates
    a lot of trash files. These trash files can be large if the SVG file
    contains many render actions.
    (Closes: #1033254).
  * Fix CVE-2023-1906: A heap-based buffer overflow issue was discovered
    in ImageMagick's ImportMultiSpectralQuantum() function in
    MagickCore/quantum-import.c. An attacker could pass specially
    crafted file to convert, triggering an out-of-bounds read error,
    allowing an application to crash, resulting in a denial of service.
    (Closes: #1034373).
  * Fix CVE-2023-2157: A heap-based buffer overflow vulnerability
    was found in the ImageMagick package that can lead to the application
    crashing. (Closes: #1036476).
  * Fix CVE-2023-3195: A stack-based buffer overflow issue was found
    in ImageMagick's coders/tiff.c. This flaw allows an attacker to trick
    the user into opening a specially crafted malicious tiff file,
    causing an application to crash, resulting in a denial of service.
  * Fix CVE-2023-34151:  A vulnerability was found in ImageMagick.
    This security flaw ouccers as an undefined behaviors of casting double
    to size_t in svg, mvg and other coders.
    (Closes: #1036999)
  * Use libfreetype-dev instead of libfreetype6-dev

 -- Bastien Roucariès <rouca@debian.org>  Sat, 29 Jul 2023 14:52:58 +0000

imagemagick (8:6.9.12.20+dfsg1-1.2) experimental; urgency=medium

  * Non-maintainer upload.
  * Build with --with-fftw because fftw is disabled by default since 6.9.12.5
    (Closes: #995290)

 -- Johannes Schauer Marin Rodrigues <josch@debian.org>  Tue, 05 Oct 2021 15:08:20 +0200

imagemagick (8:6.9.12.20+dfsg1-1.1) experimental; urgency=medium

  * Non-maintainer upload.
  * Fix FTBFS when doing arch:any-only builds by creating font symlinks for
    configure-indep as well as configure-arch targets

 -- Johannes Schauer Marin Rodrigues <josch@debian.org>  Sat, 04 Sep 2021 19:37:54 +0200

imagemagick (8:6.9.12.20+dfsg1-1) experimental; urgency=medium

  * debian/copyright: use spaces rather than tabs to start continuation lines.
  * Set field Upstream-Contact in debian/copyright.
  * Remove obsolete field Contact from debian/upstream/metadata (already present
    in machine-readable debian/copyright).
  * Avoid explicitly specifying -Wl,--as-needed linker flag.
  * Fix field name case in debian/control (Built-using => Built-Using).
  * Bump debhelper from old 11 to 13.
  * Set debhelper-compat version in Build-Depends.
  * Update standards version to 4.5.1, no changes needed.
  * Acknowledge NMU. Thanks Salvatore Bonaccorso
  * New upstream version
  * SO Bump from upstream due to structure incompatibility
  * Clean up maintainer scripts
  * Use fonts from fonts-tuffy
  * Fix mime type. Do not quote %s (Closes: #987691) and fix extra dot
    (Closes: #986471)
  * Drop old config script. Use pkgconfig please.
  * Depends on libraw-dev (Closes: #990028).
  * Fix invalid policy.xml (Closes: #991289, #990757).
  * Relax a little bit policy.xml (Closes: #860763, #941724).
  * Update Repository in debian/upstream/metadata (Closes: #991288)
  * Fix reproducible builds: Embeds date dependent on timezone
    (Closes: #983302)

 -- Bastien Roucariès <rouca@debian.org>  Fri, 27 Aug 2021 08:19:42 +0000

imagemagick (8:6.9.11.60+dfsg-1.6) unstable; urgency=high

  * Non-maintainer upload

  [ Moritz Mühlenhoff ]
  * Fix CVE-2022-44267 / CVE-2022-44268 (Closes: #1030767) (LP: #2004580)

 -- Jeremy Bicha <jbicha@ubuntu.com>  Thu, 16 Feb 2023 16:06:07 -0500

imagemagick (8:6.9.11.60+dfsg-1.5) unstable; urgency=high

  * Non-maintainer upload

  [ Nishit Majithia ]
  * SECURITY UPDATE: Multiple divide by zero issues in imagemagick allow a
    remote attacker to cause a denial of service via a crafted image file
    - debian/patches/CVE-2021-20241.patch: Use PerceptibleReciprocal()
      to fix division by zeros in coders/jp2.c
    - debian/patches/CVE-2021-20243.patch: Use PerceptibleReciprocal()
      to fix division by zeros in magick/resize.c
    - debian/patches/CVE-2021-20244.patch: Avoid division by zero in
      magick/fx.c
    - debian/patches/CVE-2021-20245.patch: Avoid division by zero in
      oders/webp.c
    - debian/patches/CVE-2021-20246.patch: Avoid division by zero in
      magick/resample.c
    - debian/patches/CVE-2021-20309.patch: Avoid division by zero in
      magick/fx.c
    - CVE-2021-20241
    - CVE-2021-20243
    - CVE-2021-20244
    - CVE-2021-20245
    - CVE-2021-20246
    - CVE-2021-20309
  * SECURITY UPDATE: Integer overflow, divide by zero and memory leak in
    imagemagick allow a remote attacker to cause a denial of service or
    possible leak of cryptographic information via a crafted image file
    - debian/patches/CVE-2021-20312_20313.patch: Avoid integer overflow in
      coders/thumbnail.c, division by zero in magick/colorspace.c and
      a potential cipher leak in magick/memory.c
    - CVE-2021-20312
    - CVE-2021-20313
  * SECURITY UPDATE: memory leaks when executing convert command
    - debian/patches/CVE-2021-3574.patch: fix memory leaks
    - CVE-2021-3574
  * SECURITY UPDATE: Security Issue when Configuring the ImageMagick
    Security Policy
    - debian/patches/CVE-2021-39212.patch: Added missing policy checks in
      RegisterStaticModules
    - CVE-2021-39212 (Closes: #996588)
  * SECURITY UPDATE: DoS while processing crafted SVG files
    - debian/patches/CVE-2021-4219.patch: fix denial of service
    - CVE-2021-4219
  * SECURITY UPDATE: use-after-free in magick
    - debian/patches/CVE-2022-1114.patch: fix use-after-free in magick at
      dcm.c
    - CVE-2022-1114
  * SECURITY UPDATE: heap-based buffer overflow
    - debian/patches/CVE-2022-28463.patch: fix buffer overflow
    - CVE-2022-28463 (Closes: #1013282)
  * SECURITY UPDATE: out-of-range value
    - debian/patches/CVE-2022-32545.patch: addresses the possibility for the
      use of a value that falls outside the range of an unsigned char in
      coders/psd.c.
    - debian/patches/CVE-2022-32546.patch: addresses the possibility for the
      use of a value that falls outside the range of an unsigned long in
      coders/pcl.c.
    - CVE-2022-32545
    - CVE-2022-32546
  * SECURITY UPDATE: load of misaligned address
    - debian/patches/CVE-2022-32547.patch: addresses the potential for the
      loading of misaligned addresses in magick/property.c.
    - CVE-2022-32547 (Closes: #1016442)

 -- Jeremy Bicha <jbicha@ubuntu.com>  Sat, 04 Feb 2023 21:50:44 -0500

imagemagick (8:6.9.11.60+dfsg-1.4) unstable; urgency=medium

  * Non-maintainer upload.

  [ Vagrant Cascadian ]
  * debian/rules: Pass MVDelegate and RMDelegate to configure. (Closes:
    #983303)

 -- Paul Gevers <elbrus@debian.org>  Sat, 31 Dec 2022 22:36:57 +0100

imagemagick (8:6.9.11.60+dfsg-1.3) unstable; urgency=medium

  * Non-maintainer upload.
  * autopkgtest: Drop PDF related tests which will fail after disabling
    ghostscript handled formats by default (Closes: #987247)

 -- Salvatore Bonaccorso <carnil@debian.org>  Tue, 20 Apr 2021 16:37:59 +0200

imagemagick (8:6.9.11.60+dfsg-1.2) unstable; urgency=medium

  * Non-maintainer upload.
  * Disable ghostscript handled formats based on -SAFER insecurity

 -- Salvatore Bonaccorso <carnil@debian.org>  Mon, 19 Apr 2021 20:16:51 +0200

imagemagick (8:6.9.11.60+dfsg-1.1) unstable; urgency=medium

  * Non-maintainer upload.
  * Import upstream patch to fix font size (Closes: #980202).

 -- Jochen Sprickerhof <jspricke@debian.org>  Tue, 13 Apr 2021 20:58:45 +0200

imagemagick (8:6.9.11.60+dfsg-1) unstable; urgency=high

  * New upstream version
    - Bug fix: "gscan2pdf tests fail", thanks to Sergio Durigan Junior
      (Closes: #980202).

 -- Bastien Roucariès <rouca@debian.org>  Mon, 01 Feb 2021 16:22:02 +0000

imagemagick (8:6.9.11.58+dfsg-1) unstable; urgency=medium

  * New upstream version:
    - Fix error on i386 with php
  * Bug fix (workarround): "Many doubled www/www; broken links on
    index.html", thanks to 積丹尼 Dan Jacobson (Closes: #978138).

 -- Bastien Roucariès <rouca@debian.org>  Fri, 22 Jan 2021 21:59:16 +0000

imagemagick (8:6.9.11.57+dfsg-1) unstable; urgency=medium

  * New upstream version:
    - Bug fix: "CVE-2020-29599", imagemagick mishandles the
      -authenticate option, which allows setting a password
      for password-protected PDF files. The user-controlled
      password was not properly escaped/sanitized and it
      was therefore possible to inject additional shell commands
      via coders/pdf.c. Thanks to Salvatore Bonaccorso
      (Closes: #977205).
    - Bug fix: "CVE-2020-27560: Division by Zero in function
      OptimizeLayerFrames", thanks to Salvatore Bonaccorso
      (Closes: #972797).
  * Fix dh_doxygen FTBFS (Closes: #971216)

 -- Bastien Roucariès <rouca@debian.org>  Mon, 11 Jan 2021 22:14:26 +0000

imagemagick (8:6.9.11.24+dfsg-1) unstable; urgency=medium

  * Acknowledge NMU
  * New upstream version:
    - Fix CVE-2019-11470: Cineon image parsing DOS (Closes: #927830).
    - Fix CVE-2019-11472: XWD image parsing DOS (Closes: #927828).
    - Fix CVE-2020-13902: Heap based overflow in TIFF image decoding.
      (Closes: #928207).
    - Fix CVE-2019-11598: Heap-based buffer over-read in PNM image
      decoding (Closes: #928206).
    - Fix CVE-2019-12974: NULL pointer dereference in pango coder.
      (Closes: #931196).
    - Fix CVE-2019-12977: use of uninitialized value" vulnerability
      in the WriteJP2Image of jp2 coder (Closes: #931191).
    - Fix CVE-2019-12978: use of uninitialized value" vulnerability
      in the pango coder. (Closes: #931190).
    - Fix CVE-2019-12979: use of uninitialized value" vulnerability
      in MagickCore/image.c (Closes: #931189).
    - Fix CVE-2019-13135: use of uninitialized value" vulnerability
      in the cut coder (Closes: #932079).
    - Fix CVE-2019-13295: Heap-based buffer over-read in
      MagickCore/threshold.c (Closes: #931457).
    - Fix CVE-2019-13297: Heap-based buffer over-read in
      MagickCore/threshold.c (Closes: #931455).
    - Fix CVE-2019-13300: heap-based buffer overflow in
      MagickCore/statistic.c (Closes: #931454).
    - Fix CVE-2019-13304: stack-based buffer overflow for
      PNM image (Closes: #931453).
    - Fix CVE-2019-13305: stack-based buffer overflow for
      PNM image (Closes: #931452).
    - Fix CVE-2019-13306: stack-based buffer overflow for
      PNM image (Closes: #931449).
    - Fix CVE-2019-13307: heap-based buffer overflow in
      MagickCore/statistic.c (Closes: #931448).
    - Fix CVE-2019-13308: heap-based buffer overflow in
      MagickCore/fourier.c (Closes: #931447).
    - Fix CVE-2019-13391: heap-based buffer over-read (Closes: #931633).
    - Fix CVE-2019-13454:  Division by Zero in MagickCore/layer.c
      (Closes: #931740).
    - Fix CVE-2019-14981: divide-by-zero in MeanShiftImage
      (Closes: #955025).
    - Fix CVE-2019-15139: DOS for XWD images (Closes: #941670).
    - Fix CVE-2019-15140: DOS for mat images (Closes: #941671).
    - Fix CVE-2019-19948: Heap-based buffer overflow in SGI coder
      (Closes: #947308).
    - Fix CVE-2019-19949: Heap buffer over-read in PNG coder
      (Closes: #947309).
    - Fix CVE-2020-10251: out-of-bounds read vulnerability for HEIC
      coder (Closes: #953741).
    - Fix CVE-2020-13902: heap-based buffer over-read for TIFF coder.
  * Bug fix: "Updating the imagemagick Uploaders list", thanks to Tobias
    Frost (Closes: #962110). Thanks  Nelson A. de Oliveira
  * Add link in api doc dir to assets javascript library
  * Fix a typo in convert man page (Closes: #953279,#947983,#921594).
  * Fix a pkgconfig error that pull q16 instead of q16hdri (Closes: #950282).

 -- Bastien Roucariès <rouca@debian.org>  Mon, 27 Jul 2020 03:13:36 +0200

# Older entries have been removed from this changelog.
# To read the complete changelog use `apt changelog imagemagick-7-common`.

Generated by dwww version 1.16 on Sat May 9 00:03:06 CEST 2026.